CVE-2024-53224
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-53224 affects the Linux kernel's RDMA/mlx5 driver, specifically concerning a race condition in the events notifier registration process. The vulnerability was discovered and disclosed in December 2024, affecting Linux kernel versions from 4.6 up to (excluding) 6.6.64, from 6.7 up to (excluding) 6.11.11, and from 6.12 up to (excluding) 6.12.2. The issue involves a race between device deregistration and pkey change work (NVD).

Technical details

The vulnerability stems from incorrect ordering of events notifier registration in relation to device registration in the RDMA/mlx5 driver. The issue occurs when MLX5_IB_STAGE_DEVICE_NOTIFIER is executed before MLX5_IB_STAGE_IB_REG, leading to a potential race condition where works can be executed after device unregistration. This results in a NULL pointer dereference, causing a kernel panic. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

When exploited, this vulnerability can cause a denial of service condition through a kernel panic. The issue specifically affects systems using the MLX5 InfiniBand driver, potentially disrupting RDMA (Remote Direct Memory Access) operations. The vulnerability can lead to system crashes when the race condition is triggered during device deregistration (NVD).

Mitigation and workarounds

The vulnerability has been fixed by moving the events notifier registration to occur after device registration. The fix involves relocating the MLX5_IB_STAGE_DEVICE_NOTIFIER stage to execute after MLX5_IB_STAGE_IB_REG, ensuring proper deregistration order. Users should update to kernel versions 6.6.64, 6.11.11, or 6.12.2 or later, depending on their kernel branch (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-modules-internal
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • libperf-devel
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • libperf-devel
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-devel
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules-partner
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management